Windows 0-Day Vulnerability Exploited in Wild to Deploy Play ransomware

Threat actors associated with the Play ransomware operation have recently taken advantage of a zero-day vulnerability in Microsoft Windows, exploiting it before a patch was released on April 8, 2025. This vulnerability, identified as CVE-2025-29824, specifically impacts the Windows Common Log File System (CLFS) driver, granting attackers the ability to elevate their privileges from standard user to full system access.

The Symantec Threat Hunter Team has reported that the Play ransomware group, also known by aliases such as Balloonfly or PlayCrypt, targeted an unnamed organization within the United States. The attackers likely gained initial access through a public-facing Cisco Adaptive Security Appliance (ASA).

Interestingly, while no ransomware payload was deployed during this intrusion, the attackers utilized a custom information-stealing tool named Grixba, which has been previously linked to the Play ransomware operation.

Microsoft’s Threat Intelligence Center (MSTIC) and Security Response Center (MSRC) have attributed this exploitation activity to a threat group known as Storm-2460, which is recognized for deploying the PipeMagic malware in its ransomware campaigns. The targets of this operation spanned various sectors, including information technology and real estate in the United States, the financial sector in Venezuela, a software company in Spain, and the retail sector in Saudi Arabia.

Exploitation of Windows 0-Day Vulnerability

According to Microsoft, “Ransomware threat actors value post-compromise elevation of privilege exploits because these could enable them to escalate initial access into privileged access.” The vulnerability received a CVSS score of 7.8, categorized as High, and was addressed in Microsoft’s April 2025 Patch Tuesday updates, which resolved a total of 121 vulnerabilities.

Technical analysis of the incident revealed a sophisticated attack chain. The vulnerability resides within the CLFS kernel driver and allows attackers to exploit a use-after-free condition. During the execution of the exploit, attackers created files in the path C:ProgramDataSkyPDF, which included a DLL that was injected into the winlogon.exe process. This maneuver enabled them to extract credentials from LSASS memory using tools like Sysinternals’ procdump.exe, create new administrator users, and establish persistence within the system.

The Play ransomware group, active since June 2022, is notorious for employing double-extortion tactics, where sensitive data is exfiltrated before encryption occurs. They have previously developed custom tools like Grixba, which have been cleverly disguised as legitimate security software, including counterfeit applications resembling those from SentinelOne and Palo Alto Networks.

Researchers have noted that while ransomware actors typically refrain from using zero-day vulnerabilities, this incident signifies an escalation in their operational capabilities. Organizations are strongly encouraged to apply the security updates released on April 8, 2025, particularly for systems running vulnerable versions of Windows. Notably, Microsoft has indicated that customers operating Windows 11 version 24H2 are not affected by this vulnerability due to pre-existing security mitigations.

This incident serves as a reminder of the ongoing evolution of ransomware tactics and underscores the critical importance of timely patching, especially for vulnerabilities that facilitate privilege escalation, which are integral components in ransomware attack chains.

IoC’s

Here’s a table of Indicators of Compromise (IoCs) linked to the Play ransomware campaign exploiting CVE-2025-29824:

Hash Filename Description Detection/Malware Name
6030c4381b8b5d5c5734341292316723a89f1bdbd2d10bb67c4d06b1242afd05 gt_net.exe Grixba infostealer tool Infostealer.Grixba1
858efe4f9037e5efebadaaa70aa8ad096f7244c4c4aeade72c51ddad23d05bfe go.exe CVE-2025-29824 exploit binary N/A1
9c21adbcb2888daf14ef55c4fa1f41eaa6cbfbe20d85c3e1da61a96a53ba18f9 clssrv.inf DLL injected into winlogon.exe Exploit payload1
6d7374b4f977f689389c7155192b5db70ee44a7645625ecf8163c00da8828388 cmdpostfix.bat Artifact cleanup script Malicious batch file1
b2cba01ae6707ce694073018d948f82340b9c41fb2b2bc49769f9a0be37071e1 servtask.bat Privilege escalation/user creation script Malicious batch file1
293b455b5b7e1c2063a8781f3c169cf8ef2b1d06e6b7a086b7b44f37f55729bd paloaltoconfig.dll Masqueraded Palo Alto Networks tool Unknown malicious DLL1
af260c172baffd0e8b2671fd0c84e607ac9b2c8beb57df43cf5df6e103cbb7ad paloaltoconfig.exe Masqueraded Palo Alto Networks tool Unknown malicious EXE1
430d1364d0d0a60facd9b73e674faddf63a8f77649cd10ba855df7e49189980b 1day.exe Suspected exploit-related utility Unknown malicious EXE1

Tax Scams Are Getting Smarter – Check Malicious Domains With Domain Research Suite

Winsage
Windows 0-Day Vulnerability Exploited in Wild to Deploy Play ransomware